{"title":"基于Merkle树的物联网数据可信传输机制","authors":"Yaxin Zhao, Chunzi Chen","doi":"10.1109/ISCIT55906.2022.9931290","DOIUrl":null,"url":null,"abstract":"In order to solve the communication security problem between clusters and clusters. This paper proposes a data-trusted transmission mechanism based on Merkle authentication, which guarantees the correctness, integrity, confidentiality and reliability of intra-cluster transmission and inter-cluster transmission messages. It can resist security problems such as forgery attacks and anti-replay attacks to a certain degree. The method adopts a hierarchical multipath routing scheme based on Merkle tree authentication. The hierarchical multipath routing scheme routes data by using multiple paths, can bypass malicious nodes to a certain extent, improve the reliability of the network, and even if the malicious node intercepts the data, it cannot know the complete information of the data.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Data Trusted Transmission Mechanism for IOT Based on Merkle Tree\",\"authors\":\"Yaxin Zhao, Chunzi Chen\",\"doi\":\"10.1109/ISCIT55906.2022.9931290\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to solve the communication security problem between clusters and clusters. This paper proposes a data-trusted transmission mechanism based on Merkle authentication, which guarantees the correctness, integrity, confidentiality and reliability of intra-cluster transmission and inter-cluster transmission messages. It can resist security problems such as forgery attacks and anti-replay attacks to a certain degree. The method adopts a hierarchical multipath routing scheme based on Merkle tree authentication. The hierarchical multipath routing scheme routes data by using multiple paths, can bypass malicious nodes to a certain extent, improve the reliability of the network, and even if the malicious node intercepts the data, it cannot know the complete information of the data.\",\"PeriodicalId\":325919,\"journal\":{\"name\":\"2022 21st International Symposium on Communications and Information Technologies (ISCIT)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 21st International Symposium on Communications and Information Technologies (ISCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCIT55906.2022.9931290\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCIT55906.2022.9931290","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Data Trusted Transmission Mechanism for IOT Based on Merkle Tree
In order to solve the communication security problem between clusters and clusters. This paper proposes a data-trusted transmission mechanism based on Merkle authentication, which guarantees the correctness, integrity, confidentiality and reliability of intra-cluster transmission and inter-cluster transmission messages. It can resist security problems such as forgery attacks and anti-replay attacks to a certain degree. The method adopts a hierarchical multipath routing scheme based on Merkle tree authentication. The hierarchical multipath routing scheme routes data by using multiple paths, can bypass malicious nodes to a certain extent, improve the reliability of the network, and even if the malicious node intercepts the data, it cannot know the complete information of the data.